General
-
Target
50b5e926533dd2e51dff556456fa3952bdca979988e42edc3e3165b4487ddaf0
-
Size
1011KB
-
Sample
230324-pen2kagc6v
-
MD5
5e5576c4fdff80b655fb4ffbd79cb48e
-
SHA1
a44cd71c13cbd6ee39388055ebdf9a59d8a28750
-
SHA256
50b5e926533dd2e51dff556456fa3952bdca979988e42edc3e3165b4487ddaf0
-
SHA512
07ff369404d3c54e393e822808d12c98e01c0f78190bde1dd58583aeea04eb2ab0408eca5974d12239331d9839a470ce66592d5b5859166a5fc9190c77b37059
-
SSDEEP
24576:PyxBH33SsJP2/QcE6J8CBMYsnfvRjtFcSm:axNSPu69SfJj
Static task
static1
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
volya
193.233.20.31:4125
-
auth_value
0efc9f002a9fbeec5f8b8338141d546a
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
50b5e926533dd2e51dff556456fa3952bdca979988e42edc3e3165b4487ddaf0
-
Size
1011KB
-
MD5
5e5576c4fdff80b655fb4ffbd79cb48e
-
SHA1
a44cd71c13cbd6ee39388055ebdf9a59d8a28750
-
SHA256
50b5e926533dd2e51dff556456fa3952bdca979988e42edc3e3165b4487ddaf0
-
SHA512
07ff369404d3c54e393e822808d12c98e01c0f78190bde1dd58583aeea04eb2ab0408eca5974d12239331d9839a470ce66592d5b5859166a5fc9190c77b37059
-
SSDEEP
24576:PyxBH33SsJP2/QcE6J8CBMYsnfvRjtFcSm:axNSPu69SfJj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-